Bugs fixes in "linux-xilinx-zynqmp"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2024-41071 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Avoid address calculations via out of bounds array indexing req | 2024-11-04 |
CVE | CVE-2024-41073 | In the Linux kernel, the following vulnerability has been resolved: nvme: avoid double free special payload If a discard request needs to be retrie | 2024-11-04 |
CVE | CVE-2024-40929 | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids In some versions o | 2024-11-04 |
CVE | CVE-2024-42244 | In the Linux kernel, the following vulnerability has been resolved: USB: serial: mos7840: fix crash on resume Since commit c49cfa917025 ("USB: seri | 2024-11-04 |
CVE | CVE-2021-47212 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Update error handler for UCTX and UMEM In the fast unload flow, the d | 2024-11-04 |
CVE | CVE-2024-26641 | In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() syzbot found __ip | 2024-11-04 |
CVE | CVE-2024-26800 | In the Linux kernel, the following vulnerability has been resolved: tls: fix use-after-free on failed backlog decryption When the decrypt request g | 2024-11-04 |
Launchpad | 2076097 | Focal update: v5.4.281 upstream stable release | 2024-11-04 |
Launchpad | 2078388 | Focal update: v5.4.282 upstream stable release | 2024-11-04 |
Launchpad | 2080595 | Focal update: v5.4.283 upstream stable release | 2024-11-04 |
Launchpad | 2081278 | Focal update: v5.4.284 upstream stable release | 2024-11-04 |
Launchpad | 2081085 | wbt:wbt_* trace event NULL pointer dereference with GENHD_FL_HIDDEN disks | 2024-11-04 |
CVE | CVE-2024-26960 | In the Linux kernel, the following vulnerability has been resolved: mm: swap: fix race between free_swap_and_cache() and swapoff() There was previo | 2024-10-17 |
CVE | CVE-2024-27397 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a time | 2024-10-17 |
CVE | CVE-2024-38630 | In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the | 2024-10-17 |
CVE | CVE-2024-45016 | In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu | 2024-10-17 |
CVE | CVE-2024-26885 | In the Linux kernel, the following vulnerability has been resolved: bpf: Fix DEVMAP_HASH overflow check on 32-bit arches The devmap code allocates | 2024-10-17 |
CVE | CVE-2024-26891 | In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Don't issue ATS Invalidation request when device is disconnected Fo | 2024-10-17 |
CVE | CVE-2024-27051 | In the Linux kernel, the following vulnerability has been resolved: cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value cpuf | 2024-10-17 |
CVE | CVE-2022-36402 | An integer overflow vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file | 2024-10-17 |
About
-
Send Feedback to @ubuntu_updates